General
-
Target
ap-file-vaultFile13347900503681937277.vol--829138591.zip
-
Size
573KB
-
Sample
240611-zcwcza1apn
-
MD5
621c79fc9a13a726d2c5a2785945ffac
-
SHA1
dc2946495cc228ade133cf0051311102b2b61e62
-
SHA256
8e1156465fa3076b74a6412cf4cc27ada788821d3d73cfd91db8b7a40b3d45ad
-
SHA512
b54820a125b6c2d2dfc745836ef0d008783cf26849ccec9634b6cd2cd56f00cd80cae422701efb11844d0a43b809692489ab53aeb022d7e533716584f48b65b2
-
SSDEEP
12288:RrlDp5/owO1UQpXfBICFotop/rAR4N14kxcHDbkNSer6AIsvkPHeq:RJp1oftJICFYopURimOSeZtkPJ
Static task
static1
Behavioral task
behavioral1
Sample
vaultFile13347900503681937277.msi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
vaultFile13347900503681937277.msi
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
vaultFile13347900503681937277.vol
-
Size
1.6MB
-
MD5
7f85e93407e2e9d2c255c58d726e22b1
-
SHA1
e4efea57c20715eda7d32f5966aa345171863dbd
-
SHA256
060128a09f050af50af1a3e797aa945f6a85d56be3d8a5cf251574dbeb09ad56
-
SHA512
69b61cc17a476ca9885d20028e64ee508b0dac420f90487e9979253e7d6b4454933f7b973eff43e941660f45b266ec51f9701a049b1e3409cc36d01043779074
-
SSDEEP
12288:/Lu54p8IAvmFACOdMFdDTCBmQo5f+xJ0St/pQf61AWcmg3au9y/rL6bNgn9th:S5XIAvGue3DGcf7SxpQcAWKa8YDn
Score8/10-
Drops file in Drivers directory
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-